Any proceedings and or activities related to the material
contained within this volume are exclusively your liability. The
misuse and mistreat of the information in this book can
consequence in unlawful charges brought against the persons
in question. The authors and review analyzers will not be held
responsible in the event any unlawful charges brought against
any individuals by misusing the information in this book to
break the law. This book contains material and resources
that can be potentially destructive or dangerous. If you do not
fully comprehend something on this book, don‘t study this
Please refer to the laws and acts of your state/region/
province/zone/territory or country before accessing, using, or
in any other way utilizing these resources. These materials and
resources are for educational and research purposes only. Do
not attempt to violate the law with anything enclosed here
within. If this is your intention, then leave now.
Neither writer of this book, review analyzers, the publisher, nor
else affiliated in any way, is going to admit any responsibility for
proceedings, actions or trials.
About The Author
Anurag Dwivedi is a 13 year old computer geek.
Who likes to find vulnerabilities
Doing Hacking , Programming , editing , cracking ,
designing and writing books
He Wants To Be An Software Designer..!!!!
Join His Blog:
Join Him On FB:
“For any successful work, it owes to thank many”
No one walks alone & when one is walking on the journey of life just where you
start to thank those that joined you, walked beside you & helped you along the
Over the years, those that I have met & worked with have continuously urged me
to write a book, to share my knowledge & skills on paper & to share my insights
together with the secrets to my continual, positive approach to life and all that
life throws at us. So at last, here it is.
So, perhaps this book & it’s pages will be seen as “thanks” to the tens of
thousands of you who have who have helped to make my life what is today.
Hard work, knowledge, dedication & positive attitude all are necessary to do any
task successfully but one ingredient which is also very important than others is
& guidance of experts & experienced person.
All the words is lexicon futile & meaningless if I fail to express my sense of regard
to my parents & sister for their sacrifices, blessings, prayers, everlasting love &
pain & belief in me.
I express heartfelt credit to My Parents Mr. Surendra Dwivedi and Mrs. Manju
Dwivedi. I also like thanks to My Brother Abhishek Dwivedi and all my Family
members For their Priceless supports. Finally to My Friends Deepika Shukla ,
Shrey Trivedi , Jigar Tank ,Aakash Kumar And Ujjwal Gautam (Gillu) without you
friends I would never reach this position thank you friend.
To finish, I am thankful to you also as you are reading this book.
Table of Contents
A. Facebook Account Hacking
1. Session Hijacking Attack
2. Facebook Security
3. Cookie Stealing Attack
7. Remote Administrator Tool
8. Social Engineering Attack
10. Using 3 Friend Attack
11. ARP Poisoning
12. FB Password Decryptor
13. Hacking FB Accounts using Google Dork List
14. FaceBook Fan Page Hacking
15. Desktop Phising
B. Facebook Tips/Tricks
1. Hack Your Friends FB Status
2. Update FB Status With Fake Names
3. USE FB In Hackers Language
4. Stop Unwanted Photo Tags In Timeline
5. How To Change/Update Status Of Someone’s In Facebook
6. Trace Someone In Facebook
7. Post Status To FB By Any Device
8. How To Post In All FB Groups In A Single Click
9. Post Blank Status And Comment In Facebook
10. How to Show who is online on Facebook when you are in
11. How To Disable Public Search Of Your FB Profile
12. How to find if somebody hacked your Facebook account
13. How To Track FB Activities
14. How To Flip FB Status Updates
15. How to delete your friends Facebook account in 24 hours
16. Add All Facebook Friends In FB Groups In Single Click
17. Convert Your Any Image Into Facebook Chat Codes
18. How To Convert FB Account Into Fan Pages
19. How To Make Single Name FB Account
20. Insert Profile Picture In FB Account
22. Change Your Facebook Theme
23. Login Your Too Many FB Accounts In Google Chrome
Section 1 – Session Hijacking :What Is Session Hijacking Attack ?
Session hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by
surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's
session ID has been accessed (through session prediction), the attacker can masquerade as that user
and do anything the user is authorized to do on the network.
The session ID is normally stored within a cookie or URL. For most communications, authentication
procedures are carried out at set up. Session hijacking takes advantage of that practice by intruding in
real time, during a session. The intrusion may or may not be detectable, depending on the user's level of
technical knowledge and the nature of the attack. If a Web site does not respond in the normal or
expected way to user input or stops responding altogether for an unknown reason, session hijacking is a
Step By Step Explanation Of How To Carry Out This
First of all, you would need to connect to an unsecured wireless connection that others are using. Then
we start capturing packets transferred over this network. Note that your wireless adapter needs to
support monitor mode to scan all packets transferred over a network. you can check your wi-fi card
specifications to see if it supports monitor mode.
We would then need to use a network sniffing tool so sniff packets transferred over the network. In this
case, I am using a tool called Wireshark (Download From Here). Within wireshark, there is a menu called
"Capture"; Under the capture menu, select interfaces from that menu, and a list of your interfaces will
Next you select Start Next to the interface that you have enabled monitor mode on. most times it is the
interface that is capturing the most packets. In my case, Microsoft interface is capturing the most
packets, so i will select to start capturing with the microsoft interface. You would leave wireshark to
capture packets for a couple of seconds depending on the amount of persons currently using the
network. Say 30 seconds if 10 people currently are using the network, or 30 minutes if there is barely
network activity going on. While capturing, wireshark will look something like this.
After capturing a certain amount of packets, or running the capture for a certain amount of time, stop it
by clicking on the stop current capture button.
After stopping the capture, you will need to look for the user's facebook session cookie which,
hopefully was transferred in one of the packets captured. to find this cookie, use the wireshark search
which can be found by pressing "ctrl + f" on your keyboard. In this search interface, select Find: By
"String"; Search In: "Packet Details". and Filter by the string "Cookie".
When you press find, if there is a cookie, this search will find it, if no cookie was captured, you will have
to start back at step 2. However, if youre lucky and some cookies we're captured, when you search for
cookie, your interface will come up looking like this in the diagram below. You would notice the cookie
next to the arrow contains lots of data, to get the data. the next thing you do is to right click on the
cookie and click copy->description.
After copying the description, paste it in a text file, and separate each variable to a new line (note the
end of every variable is depicted by a semicolon eg - c_user=100002316516702;). After some research
and experimenting, i figured out that facebook authenticated the user session by 2 cookies called c_user
and xs. Therefore you will only need the values of these cookies, and then need to inject them into your
browser. Before injecting the cookies, here is what my facebook page looked like:
The next thing you would need to do is to inject this information as your own cookie. so firstly you
would need to install a cookie manager extension for your browser, I'm using firefox Cookie Manager.
After installing this extension, you will find it under Tools->cookie manager. The interface for cookie
manager looks like this:
The first thing we would need to do is to clear all cookies, so clear all the cookies you currently have.
Then select the "Add Cookie" link to add a new cookie. The first cookie you will add is the c_user cookie
which will have the following information:: Domain - ".facebook.com", name-"c_user", value-"the value
you copied earlier from the wireshark scanning" and the Path-"/"; leave the isSecure and Expires On
values to default:
The next thing you do is to hit the "Add" button and the cookie is saved. Repeat the same steps to add
the xs cookie with all of the same information, except the value, which would be the xs value you have.
After adding these 2 cookies, just go to facebook.com, refresh the page and... Boom!! you will see you
are logged in as that user whose cookie information you stole. Here is my facebook page after i injected
Section 2 – Facebook Security :-
#1– Enable HTTPS ?
When you bookmark the URL for Facebook or any of your other social networks, be sure to use HTTPS
instead of HTTP. This encrypts your communications.
In fact, you will have to temporarily disable this feature any time you give access to a new application.
That alone should give you confidence that you have achieved a greater level of protection.
#2– Disable Online Chat ?
All of us have witnessed Facebook scams, with the most common being the infamous chat message …
“I’m in the UK and have been mugged – please send money so I can get back home.”
While I have no technical basis for this, it stands to reason that the hackers get in through the chat
service. Every time I have noticed bogus comments allegedly made by me to my Facebook friends, it is
because I had previously used the online chat.
To disable chat just click on the little wheel in the right sidebar and take yourself offline. Then close the
window and make sure is registers as chat offline.
#3 – Review Permissions Granted to Third Party Apps ?
When you grant access to Facebook apps, those permissions endure long after you stop using them. Go
to this link to review your Facebook app permissions – and disable any you are no longer using.
You will probably be surprised at the long list permissions your have previously granted!
#4 – Activate Text Message Notifications ?
Facebook allows you to receive text notifications whenever your account is accessed from a device
other than your primary computer or mobile device.
You simply go to Account Settings and then to Security Settings to set-up the proper notifications to
your mobile device.
First go to login approvals – then login notifications.
You can only choose email or text notifications. By choosing text notifications you not only get an
immediate notice, but you also activate both your mobile device and your primary computer as
approved access points.
#5 – Maintain Public and Private Email Addresses ?
The email address you use for Facebook should be distinct from the one you use where security is more
critical – such as your online banking or Paypal account.
If your Facebook account gets hacked its embarrassing. If that is the same email used on your more
secure accounts, now that vulnerability could be costly.
Obviously, if you are selective with your email addresses and periodically change your passwords, you
minimize your chances of being hacked.
Did you know that anyone can search Facebook for an email address? For example, if you are looking a
common name such as John Smith, you only need to search with their email to find the right one.
This is handy for finding your friends on Facebook, but also useful for hackers. The safe bet is to use
distinct passwords for your public and private email addresses.
There are even more ways to protect your Facebook and other online accounts, but these 5 are the
most essential, and they are specific to Facebook, which seems to be the site that is the most
Section 3 – Cookie Stealing Attack :What Are Cookies ? And What Is The Use Of Stealing Cookies ?
Cookies are small files that stored on users computer by websites when a user visits them. The stored
Cookies are used by the web server to identify and authenticate the user .For example when a user
logins in Facebook a unique string is generated and one copy of it is saved on the server and other is
saved on the users browser as Cookies. Both are matched every time the user does any thing in his
So if we steal the victims cookie and inject them in our browser we will be able to imitate the victims
identity to the web server and thus we will be able to login is his account . This is called as Side jacking
.The best thing about this is that we need not no the victims id or password all we need is the victims
Hack Facebook / Twitter By Stealing Cookies ?
1. Ettercap or Cain and able for ARP poisoning the victim
2. Wire shark for sniffing and stealing cookies
3. Firefox browser and Cookie logger add on for injecting the stolen cookies in our browser
1. First ARP poison the victim .For this you can refer my previous articles on how to ARP poison the
victims computer using Cain and able or Ettercap
2. After ARP poisoning open Wire shark ,click capture button from the menu bar , then select interface
.Now select your interface (usually eth0 ) finally click start capture .
3. Now you can see the packets being captured , wait for a while till the victim logs in his account(
Facebook /twitter ),
4. Mean while Find the IP address of Facebook ,for this you can open CMD (command prompt ) and
enter .Ping Facebook.com to find its IP address.
5. Now filter the packets by entering the the IP address (Facebook) in the filter bar and click apply
6. Now Locate HTTP Get /home.php and copy all the cookie names and values in a notepad.
7. Now open Firefox and open add and edit cookies ,which we downloaded earlier , add all the cookie
values and save them.
8. Now open Facebook in a new tab , you will be logged in the victims account .
Chris Defaulter Valentine ......you have hacked the victims Facebook account by stealing cookies , You
can also follow the same steps to hack Twitter accounts
Section 4 – Keylogger :What Is Keyloggers?
Using key logger utility you will be able to establish full control over your computer. You will also find
out, what was going on your computer in your absence: what was run and typed etc which act as best
children internet protection software. Using the keylogging program constantly, you can restore the
previously typed text in case you have lost it. Keystroke logger software works in the hidden mode and
invisible on Windows operating system including Windows 7/VISTA/XP/Server 2008/NT/98 etc.
Lets start the guide: How to use it. ?
1) first you need to download this application, you can download it from its website Download, but
currently its under maintenance..
Download here - Click Here To Download
2) I am giving tut about Neptune 1.4 only, but you can use 1.45 also, it is a updated version that sends
After downloading, Extract the .rar file, open the project's folder, click on project Neptune v1.4, Now it
will show a window like shown below, Do whatever mentioned in screen shot.
Note: i am giving tut for getting logs by mail(gmail here), but you can use other also, or can use ftp
3) Now go to 'Server Creation' tab and press 'Generate new server' under 'server creation', and give
name of your keylogger and thats it.. you are done :)
4) Make it self destructive :In tab Extra options, you can check 'self destruct on ', if you want
that it should be remove after any particular date.
5) Add Icon: You can also add any icon to the final keylogger file, for that go to 'Server
Creation' tab and select 'Use file icon' under 'server settings' and select any icon file.
6) Binding: You can bind it with any other file also, for that press the file binder button, a
window will open(as shown in screen shot)then right click and select 'add file' and then select
anything for ex. any software, movie, video, song etc. with which you wanna bind it. 5.1) After
selecting the binding file, dont close this window, and go to step 3.
7) Sreenshots: (only available in naptune 1.45) Go to Extra options, check 'send screen shots' under
Section 5 – Clickjacking :-
What is Clickjacking?
Clickjacking is a technique used by hackers or spammers to trick or cheat the users into clicking on links
or buttons that are hidden from normal view (usually links color is same as page background).
Clickjacking is possible because of a security weakness in web browsers that allows web pages to be
layered and hidden from general view. In this situation what happens is that You think that you are
clicking on a standard button or link, like the PLAY button or download button on an video or some stuff,
but you are really clicking on a hidden link. Since you can’t see the clickjacker’s hidden link, you have no
idea what you’re really doing. You could be downloading malware or making all your Facebook
information public without realizing it. Some good hackers make ajax keyloggers and put them as
web browser and records whatever you type while the web browser is open and stores this information
on their servers.
There are several types of clickjacking but the most common is to hide a LIKE button under a dummy or
fake button. This technique is called Likejacking. A scammer or hacker might trick you by saying that you
like a product you’ve never heard. At first glance, likejacking sounds more annoying than harmful, but
that’s not always true. If you’re scammed for liking Mark Zukenberg, the world isn’t likely to end. But
you may be helping to spread spam or possibly sending Friends somewhere that contains malware.
How It Work ?
The like button is made hidden and it moves along with the mouse.So, wherever the user clicks, the like
After downloading the script extract all the files.Now modify the config.js and follow the below
1. Modify config.js file in "src" folder to change fan page URL and other things.
Comments are provided beside them to help you what they do exactly.
2. There is a time out function after which the like button will not be present(move) anymore.
"time" if set to 0 will make it stay forever(which is usually not preferred).
3. Set opacity to '0' before you run the script. Otherwise the like button will not be invisible
Properly set the var in the file if it is jumbled ?
How To Run The Script ?
1. Add config.js just above head tag in your pages
---------------------------------------------------------------------------------------------------------------2. Add like.js after body tag in your pages
---------------------------------------------------------------------------------------------------------------Remove src link with your uploaded link.
5. That's it. The script is ready to go.
Section 6 – Tabnapping :-
Hey friends,It's Chris Defaulter Valentine.An Microsoft Certified Systems Engineer
(MCSE),Internet Marketer IIT hacker I Have 10 Years' Experience Circumventing
Information Security Measures And Can Report That I've Successfully Compromised All
Systems That I Targeted For Unauthorized Access Except One. I Have Two Years'
Experience As a Private Investigator, And My Responsibilities Included Finding People
And Their Money, Primarily Using Social Engineering Techniques. today i am going to
How to Hack emails, social networking websites and other websites involving login
information. The technique that i am going to teach you today is Advanced Tabnabbing.
I have already explained what is basic tabnabbing today we will extend our knowledge
base, i will explain things with practical example. So lets learn..
1. A hacker say(me Chris) customizes current webpage by editing/adding some new
parameters and variables.( check the code below for details)
2. I sends a copy of this web page to victim whose account or whatever i want to hack.
3. Now when user opens that link, a webpage similar to this one will open in iframe
containing the real page with the help of java script.
4. The user will be able to browse the website like the original one, like forward
backward and can navigate through pages.
5. Now if victim left the new webpage open for certain period of time, the tab or
website will change to Phish Page or simply called fake page which will look absolutely
similarly to original one.
6. Now when user enter his/her credentials (username/password), he is entering that in
Fake page and got trapped in our net that i have laid down to hack him.
Here end's the attack scenario for advanced tabnabbing.
Before coding Part lets first share tips to protect yourself from this kind of attack
because its completely undetectable and you will never be able to know that your
account is got hacked or got compromised. So first learn how to protect our-self from
Follow below measure to protect yourself from Tabnabbing:
1. Always use anti-java script plugin's in your web browser that stops execution of
2. If you notice any suspicious things happening, then first of all verify the URL in the
3. If you receive any link in the Email or chat message, never directly click on it. Always
prefer to type it manually in address bar to open it, this may cost you some manual
work or time but it will protect you from hidden malicious URL's.
4. Best way is to use any good web security toolbar like AVG web toolbar or Norton
web security toolbar to protect yourself from such attacks.
5. If you use ideveloper or Firebug, then verify the headers by yourself if you find
That ends our security Part. Here ends my ethical hacker duty to notify all users about
the attack. Now lets start the real stuff..
Note: Aza Raskin was the first person to propose the technique of tabnabbing and still
we follow the same concept. I will just extend his concept to next level.
First sample code for doing tabnabbing with the help of iframes:
Author: Chris Defaulter Valentine ( Anonymous )